Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Microsoft Warns Of Looming Digital Certificate Deadline

To improve Windows security, a Microsoft security update soon will block access to RSA digital certificates that have a key length of less than 1,024 bits.

11 Security Sights Seen Only At Black Hat
11 Security Sights Seen Only At Black Hat
(click image for larger view and for slideshow)
Memo from Microsoft to Windows administrators: Make sure all of your digital certificates have at least 1,024 bits.

That warning comes as Microsoft prepares to release an automatic security update for Windows on Oct. 9, 2012, that will make longer key lengths mandatory for all digital certificates that touch Windows systems.

Notably, Internet Explorer won't be able to access any website secured using an RSA digital certificate with a key length of less than 1,024 bits. Likewise, without a strong enough certificate, certificate authority service in Windows won't be able to start, ActiveX controls might be blocked, users might not be able to install applications, and Outlook 2010 won't be able to encrypt or digitally sign emails, or communicate with an Exchange server for SSL/TLS communications. In addition, Microsoft warned that after its security update, Operations Manager will be unable to monitor--or discover new instances of--any HP-UX PA-RISC computers that don't have an RSA digital certificate of least 1,024 bits.

Microsoft's move reflects the relative ease with which digital certificates of less than 1,024 bits can now be cracked--or derived--via brute-force attacks. "The private keys used in these certificates can be derived and could allow an attacker to duplicate the certificates and use them fraudulently to spoof content, perform phishing attacks, or perform man-in-the-middle attacks," according to Microsoft.

[ Read Cryptographers Discover Public Key Infrastructure Flaw. ]

The "fix" for keeping up with Microsoft's mandatory security improvement is simple. "For those who find they are using certificates with RSA key lengths of less than 1,024 bits, those certificates will be required to be reissued with at least a 1,024-bit key length," according to a Microsoft Security Resource Center blog post. It also noted that "1,024 should, by the way, be considered a minimum length; the most up-to-date security practices recommend 2048 bits or even better."

Microsoft's security update is available now for download. The company recommends that IT administrators gain familiarity with it, and test any existing processes that might break, before it releases the update via Microsoft Update in October. To help, a Microsoft knowledgebase article, Microsoft Security Advisory: Update for minimum certificate key length details tips and techniques for discovering any digital certificates in use that have a key length of less than 1,024, as well as recommendations for updating them.

The timing of Microsoft's digital certificate spring cleaning has no doubt been driven by the Flame malware, discovered in May, and inside which security experts found built a "collision attack" against the Microsoft Terminal Services encryption algorithm, which allowed the malware to successfully spoof that Windows service and automatically install itself on targeted PCs.

In the eyes of Marc Stevens, a crypto-analyst at the Centrum Wiskunde and Informatica (CWI) in Amsterdam who studied Flame, whoever created that collision attack was practicing "world-class cryptanalysis." But when it comes to malware attacks, what's leading edge quickly becomes commonplace, as known attack techniques get emulated by other attackers, and included as automated options in crimeware toolkits and the open source Metasploit penetration testing toolkit.

Mobile employees' data and apps need protecting. Here are 10 ways to get the job done. Also in the new, all-digital 10 Steps To E-Commerce Security special issue of Dark Reading: Mobile technology is forcing businesses to rethink the fundamentals of how their networks work. (Free registration required.)

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
9/8/2012 | 9:00:13 PM
re: Microsoft Warns Of Looming Digital Certificate Deadline
This isn't being accelerated due to Flame.

Sure, it makes the situation sound more dire because there's a (relatively) new threat out there that could take advantage of the inherent vulnerability involved in using shorter keys, but this has been around for a while.

Microsoft has been writing about this on TechNet for a while (see: A Note on Implementation of the Requirement to Issue Longer Key Length Certificates (December 7, 2010)). This revocation of 1024-bit keys has to do with NIST Special Publication 800-131A.

So, no, Microsoft isn't screaming about the sky falling because of Flame or the Terminal Services problem that was known about a while ago... it has to do with Federal cryptographic regulations. And this is something that any Windows Administrator worth their weight in salt has already implemented a remediation plan for.

Andrew Hornback
InformationWeek Contributor
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/14/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-1448
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1447.
CVE-2020-1449
PUBLISHED: 2020-07-14
A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.
CVE-2020-1450
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1451, CVE-2020-1456.
CVE-2020-1451
PUBLISHED: 2020-07-14
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'. This CVE ID is unique from CVE-2020-1450, CVE-2020-1456.
CVE-2020-1454
PUBLISHED: 2020-07-14
This vulnerability is caused when SharePoint Server does not properly sanitize a specially crafted request to an affected SharePoint server.An authenticated attacker could exploit this vulnerability by sending a specially crafted request to an affected SharePoint server, aka 'Microsoft SharePoint Re...